Yep, any system built on a pool of computers can scale that, though I have to imagine there must be interesting discussions between companies and their lawyers about "your design just lost us X% of the compute we bought, please pay us X% + Y% for our trouble."
I wonder what embedded systems operators are going to do. Most embedded systems don't intend to have execution of untrusted code, which is not to say it can't be made to happen. I would guess that most embedded system either have no notion of processes and inter-process protection (the bare-metal approach, used to be common), or they run an OS but it's not likely to be free of root holes.
(no subject)
Date: 2018-01-15 10:58 am (UTC)I wonder what embedded systems operators are going to do. Most embedded systems don't intend to have execution of untrusted code, which is not to say it can't be made to happen. I would guess that most embedded system either have no notion of processes and inter-process protection (the bare-metal approach, used to be common), or they run an OS but it's not likely to be free of root holes.